Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (7): 15-17    DOI:
Current Issue | Archive | Adv Search |
Design of the Cloud Storage Authentication System Based on Fingerprint Identification
Yao Bingying1,Li Chuanqing1,Li Chao2
Guangzhou Huaxia Vocational College Guangdong Institute of Science and Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  For the lower safety problem in the "static password + real-time data" authentication modes of WEB cloud storage system, this paper designs an authentication system based on fingerprint identification technology. It uses the authentication model based on fingerprint identification for user identity authentication, improving the authentication security and reliability, and solving the issues of user account illegal access and tampering. It proposes the hybrid encryption algorithm based on symmetric encryption algorithm and asymmetric encryption algorithm which is used as a identity authentication protocol. This method effectively improves the certification efficiency, and realizes the effective transmission of huge amounts of data. The experimental results show that the scheme obtains very good application in the cloud storage identity authentication system.
Key wordscloud storage      fingerprint identification      identity authentication      SSL certification agreement      mixed encryption      security     
Published: 13 November 2017
ZTFLH:  TP391.41  

Cite this article:

Yao Bingying, Li Chuanqing, Li Chao. Design of the Cloud Storage Authentication System Based on Fingerprint Identification. Computer & Telecommunication, 2016, 1(7): 15-17.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I7/15

[1] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[2] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[3] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[4] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[5] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[6] LI Ling. Cloud Storage Construction of Teaching Files in University Computer Room Based on ownCloud[J]. 电脑与电信, 2021, 1(1): 30-33.
[7] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[8] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[9] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[10] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[11] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[12] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[13] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[14] LI Jun-tao. Research on Security Technology of Intelligent Collaborative Network[J]. 电脑与电信, 2020, 1(4): 48-50.
[15] ZHOU Xiao-juan. Discussion on the Computer Network Security and Preventive Measures in the Era of Big Data[J]. 电脑与电信, 2020, 1(3): 41-43.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd